A cyber attack is a malicious attack conducted by cybercriminals against a single or multiple computers, networks, or infrastructure with the intention of disabling/destroying the target computers, stealing/exposing data, gaining unauthorized administrative access, or using the targeted computer as a launch point for other attacks.

Cybercriminals attack through deploying several methods including malware/ransomware/spyware dropping, phishing campaigns, Denial of Service attacks, zero-day exploits, Man-in-the-Middle attacks, Cryptojacking, SQL injection, and DNS tunneling.

Cybercriminals, individuals or teams, have various motives for committing attacks; the most relevant ones include financial gain, theft of intellectual property, making a political statement, gaining fame, and revenge.

Week in Cyber News: TikTok Sued, Adobe Patches Flaws, Anubis & Zeus Sphinx Malware New Malicious Features, RATicate Hacking Group

Popular services, programs, and organizations have always been a target of cyber-attacks to exploit the vulnerabilities in the service, steal users’ information, steal sensitive corporate information, or compromise the infrastructure. We have gathered the major cyber news over the past week in one post. TikTok fails to fulfill Children’s Privacy agreement The popular video-sharing app…

WordPress Plugins, Cisco, Cisco Webex, Cerberus RAT, Microsoft Teams

Week In Cyber News: Cerberus RAT new Variant, 2 WordPress Plugins Vulnerabilities, Cisco Webex Phishing Campaign, and More

Popular services, programs, and organizations have always been a target of cyber attacks to exploit the vulnerabilities in the service, steal users’ information, steal sensitive corporate information, or compromise the infrastructure. We have gathered the major cyber news over the past week including Cerberus RAT, WordPress plugins vulnerabilities, Cisco Webex phishing emails, Cisco update, and…

fingerprint authentication- 3D printers

3D printers can trick fingerprint authentication

For nearly a decade now, fingerprint authentication has been a quicker and easier alternative for password security for smartphones and laptops. The early forms of fingerprint authentication were quickly bypassed; nevertheless, ever since the debut of Apple’s TouchID in the iPhone 5 seven years ago, the technology has become more advanced. However, researchers are now…

Docker

Attackers Are Exploiting Docker Containers to Deliver Cryptomining Malware

For the past few months, an organized attack campaign is targeting misconfigured open Docker Daemon API ports to spread the Kinsing malware which is designed for cryptomining. The Kinsing malware is a Linux-based malware that contains a cryptominer that spreads through containers with the purpose of mining the Bitcoin cryptocurrency. According to Gal Singer, cybersecurity…